• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: password

World Password Day

Microsoft: Move Away From Phone-based Multi-factor Authentication

Microsoft’s Director of Identity Security Alex Weinert suggests organizations should avoid using vulnerable mobile phone-based authentication methods.

November 12, 2020 Zachary Comeau Leave a Comment

Multi-factor authentication (MFA) – a  cybersecurity measure that grants access to an account or application only after a user presents two or more pieces of evidence to prove they own the account – is often cited by experts as a simple but necessary protocol to protect against phishing attacks. Users can usually select a few […]

Read More

Progress MOVEit vulnerability

Warning: Cybercriminals Targeting Healthcare Systems with Ransomware

Three federal U.S. agencies are warning of an 'increased and imminent' ransomware threat to hospitals and healthcare systems.

October 29, 2020 Zachary Comeau Leave a Comment

U.S. federal authorities are warning healthcare systems of a spike in ransomware attacks against hospitals and healthcare systems The joint warning from the U.S. Cybersecurity and Infrastructure Agency, FBI and Department of Health and Human Services says malicious cyber actors are targeting the healthcare sector with Trickbot malware, leading to ransomware attacks, data theft and […]

Read More

White House AI Regulations, ChatGPT, Generative AI

Report: Trump’s Twitter Account Easily Hacked By Dutch Security Researcher

President Donald Trump reportedly didn't have two-step authentication enabled and was using a very guessable password on his popular Twitter account.

October 22, 2020 Zachary Comeau Leave a Comment

Some of the best ways to avoid data breaches and cybersecurity compromise is to practice good password security and use other tools like two-factor authentication. That means using unique passwords that aren’t easy to guess and enabling multi-factor authentication on all of your accounts – including social media. U.S. President Donald Trump apparently didn’t get […]

Read More

employee data access

Schools Have to Address These Distance Learning Cybersecurity Threats

As administrators struggle to ensure connectivity and accessibility, many aren’t addressing distance learning cybersecurity threats.

October 22, 2020 TechDecisions Staff Leave a Comment

Perhaps no single industry has struggled to adjust more to COVID-19 than education. The pandemic has greatly accelerated the broad adoption of e-learning solutions. Those school districts that invested in robust IT systems have been validated and are continuing to build out their resources. Meanwhile, those districts that did not already have e-learning technologies in […]

Read More

implementing, zero trust approach, zero trust misconceptions

The 5 Misconceptions You Probably Have About a Zero Trust Approach

We bet you've probably fell victim to one of these misconceptions about implementing a zero trust approach. That's ok, we're here to help.

October 21, 2020 Adam Forziati Leave a Comment

Zero Trust has gained significant momentum this year with the surge in pandemic-induced remote work, taking a fast track from security option to business priority. In fact, recent research from Microsoft shows 51% of business leaders are speeding up their deployment of Zero Trust capabilities. But what does Zero Trust really mean in practice and what are […]

Read More

Zoom Rooms User Interface

Zoom Begins Rollout of End-To-End Encryption

Zoom is beginning a phased rollout of and end-to-end encryption offering to better secure the platform after security issues.

October 16, 2020 Zachary Comeau Leave a Comment

Zoom next week will begin rolling out its end-to-end encryption offering as a technical preview for 30 days as the company seeks feedback form its users, the company announced during its two-day virtual Zoomtopia event.  The enhanced encryption for both free and paid users comes after Zoom in May announced plans to build an end-to-end […]

Read More

mobile workforce data security

Safeguarding Your Mobile Workforce Data Security in 4 Steps

Businesses are allowing employees to WFH even after the COVID-19 pandemic subsides. Here are four measures to ensure mobile workforce data security.

October 8, 2020 TechDecisions Staff Leave a Comment

Research firm Gartner has found that, after the COVID-19 pandemic subsides, businesses will face a new kind of challenge: managing their mobile workforce data security. According to Gartner survey, 82% of business leaders plan to let employees continue to work from home in at least some capacity, while 47% plan to allow employees to do so […]

Read More

Election Vendor Hacked

Report: Election Vendor’s Internal Systems Hacked

According to Reuters, a company that provides software for elections told its customers that its internal systems have been hacked.

September 25, 2020 Zachary Comeau Leave a Comment

For the last few months during the COVID-19 pandemic and leading up to the 2020 U.S. president election, cybersecurity experts are being extremely vigilant and are warning of increasing attacks against federal agencies and enterprises. And now, according to Reuters, election vendors are being targeted. Tyler Technologies, a company that makes products used by U.S. […]

Read More

My TechDecisions Podcast, zero trust

My TechDecisions Podcast Episode 101: Cybersecurity Amid Increasing Threats

Joshua Liberman, President of IT provider Net Sciences, joins the podcast to talk about how companies can stay secure as cyber threats increase.

September 25, 2020 Zachary Comeau Leave a Comment

Joshua Liberman, President of IT provider Net Sciences, joins the podcast to talk about how companies can stay secure as cyber threats increase.

Read More

Increasing Cyber Attacks

Now Is the Time to be Vigilant Amidst Increasing Cyber Attacks

As the COVID-19 pandemic and political turmoil lead to increasing cyber attacks, organizations and end users should take extra precaution.

September 15, 2020 Zachary Comeau Leave a Comment

While remote work and working from home are convenient and just a way of life these days, the trend is opening the door to cyber attackers, nation states and part-time hackers to take advantage of the hysteria and cast a wide net in a bid to compromise our networks. Across the board, companies are reporting […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 29
  • Page 30
  • Page 31
  • Page 32
  • Page 33
  • Interim pages omitted …
  • Page 53
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.